default search action
Automatic Control and Computer Sciences, Volume 46
Volume 46, Number 1, February 2012
- Vladimir A. Bashkin:
Modular nets of active resources. 1-11 - M. Broitman, N. Shilinskii, K. Solovyov:
Adaptive management algorithms for a fixed jitter buffer. 12-17 - Modris Greitans, Vladimir N. Aristov, T. Laimina:
Application of the Karhunen-Loeve transformation in bio-radiolocation: Breath simulation. 18-24 - A. V. Zelenkov, D. Liepkalns, A. Yershov, A. Maklakovs:
Development and experimental validation of automatic radar recorder of the number and speed of vehicles for opposite traffic directions. 25-33 - V. Karklinsh:
The "up-and-down" method with a variable step in digital sampling conversion. 34-40 - A. V. Ostrouh, N. G. Kuftinova:
Automation of planning and management of the transportation of production for food-processing industry enterprises. 41-48 - N. I. Sulima:
Probabilistic model of overbooking for an airline. 49-56
Volume 46, Number 2, April 2012
- Arnis Kirshners, Edgars Liepinsh, Serge Parshutin, Janis Kuka, Arkady Borisov:
Risk prediction system for pharmacological problems. 57-65 - Ya. N. Imamverdiev, Lyudmila V. Sukhostat:
A method for cryptographic key generation from fingerprints. 66-75 - Aleksandrs Ipatovs, Nikolajs Bogdanov, Ernests Petersons:
Evaluation of the rate of the data transfer between vehicles and base stations in wireless networks. 76-82 - Manfred Schneps-Schneppe:
M2M communications based on the M-Bus protocol. 83-89 - Dmitrii V. Speranskii:
Interval statement of the input word recognition problem for a linear machine. 90-94
Volume 46, Number 3, May 2012
- Gazanfar A. Rustamov:
Constructing quasi-invariant control systems based on the Lyapunov function method for nonlinear plants with an incomplete mathematical model. 95-102 - Vladimir A. Bogatyrev, S. V. Bogatyrev, I. Yu. Golubev:
Optimization and the process of task distribution between computer system clusters. 103-111 - V. N. Boicov:
Customer flows in a network with two types of service. 112-118 - V. S. Mukha:
Linear procrustes transformation for letter recognition. 119-129 - N. M. Ivanov:
Adaptive spatial processing of electromagnetic field signals in antenna arrays. 130-138 - K. Kruminsh, V. Plotsinsh:
Signal distortions in comparator pulse gate transformation using the statistical method for a low number of samples. 139-145
Volume 46, Number 4, July 2012
- A. B. Sizonenko:
A high-performance algorithm for calculating conjunctive and disjunctive terms in polynomial representations of Boolean functions. 147-156 - Vitaly I. Levin:
Optimization in terms of interval uncertainty: The determinization method. 157-163 - Fikrat G. Feyziyev, Mehrdad Arablu Babavand Aslan:
Description of decoding of cyclic codes in the class of sequential machines based on the Meggitt theorem. 164-169 - Aleksandra R. Eremina, Yu. V. Malinkovskii:
Invariance of the stationary distribution of states of networks with multimode service, different types of requests, and discriminatory processor sharing. 170-178 - Modris Greitans, Vladimir N. Aristov:
Conservation of the law of phase modulation for UWB pulse signals in the first principal component. 179-184
Volume 46, Number 5, September 2012
- D. V. Speransky:
Fuzzy automaton finite state recognition. 185-190 - Dmitry Ya. Novikov, Liudmila D. Cheremisinova:
Investigation of simulation-based verification methods for descriptions with functional indeterminacy. 191-199 - M. V. Shakhanova:
The base model of role-based access control and the "cost-risk" criterion of data processing. 200-206 - Maxim Vashkevich, Alexander A. Petrovsky:
An algebraic method for synthesizing fast algorithms of discrete cosine transform of arbitrary size. 207-213 - Aivars Lorencs, Yuris Sinitsa-Sinyavskis:
A two-stage method for building classifiers. 214-222 - N. K. Kasumov:
Data positioning as an instrument of constructive data compression. 223-231 - V. Karklinsh:
The adaptive "up-and-down" method with a variable step. 232-237
Volume 46, Number 6, November 2012
- M. A. Gladshtein:
Quantum-dot cellular automata serial decimal subtractors. 239-247 - Alexander N. Sychev:
Composition of logical switching networks in neural structures. 248-260 - Aldis Baums:
Indicators of the real time of a mobile autonomous robot. 261-267 - S. G. Kerimov, G. S. Kerimova:
Methods and means for arranging information content searches. 268-272 - V. N. Boicov:
Evaluation of network transport services objects. 273-279 - K. Kruminsh, V. Plotsinsh:
Adaptive k-up-and-down method for comparator type equivalent time conversion of UWB radar signals. 280-287 - A. S. Rybakov:
Compression functions used in the algorithms for the estimation of signal arrival time under high-precision event timing. 288-298
Volume 46, Number 7, December 2012
- Igor S. Anureev:
Typical examples of using the atoment language. 299-307 - M. M. Atuchin, Igor S. Anureev:
Attribute annotations and their use in C program deductive verification. 308-316 - Vladimir A. Bashkin:
Approximating bisimulation in one-counter nets. 317-323 - Mikhail A. Belyaev, V. A. Tsesko:
LLVM-based static analysis tool using type and effect systems. 324-330 - Natalya Olegovna Garanina:
Optimisation procedures in affine model checking. 331-337 - M. I. Glukhikh, Vladimir M. Itsykson, V. A. Tsesko:
Using dependencies to improve precision of code analysis. 338-344 - Dmitry Anatoly Zaitsev:
Inhibitor Petri net executing an arbitrary given Markov normal algorithm. 345-355 - Alexey V. Zakharov, Mikhail J. Moiseev:
Automatic data race detection in SystemC models. 356-363 - A. V. Klimov:
A simple algorithm for solving the coverability problem for monotonic counter systems. 364-370 - Sergey Baranov, Vsevolod Kotlyarov:
A formal application model for code and test generation. 371-378 - Natalia Kushik, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko, Willy Jimenez, Edgardo Montes de Oca:
A SPIN-based approach for detecting vulnerabilities in C programs. 379-386 - Dmitri M. Beloglazov, Mikhail Mashukov, V. A. Nepomnyashchiy:
Verification of telecommunication systems specified using communicating finite-state automata using colored Petri nets. 387-393 - Alexey V. Promsky:
C program verification: Verification condition explanation and standard library. 394-401 - Nikolay V. Shilov:
Verification of backtracking and branch and bound design templates. 402-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.